Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 08:42

General

  • Target

    572fa6d58d106b440026e0341e060453ee5ac37e9473660f8164bb1f4d95c13c.exe

  • Size

    313KB

  • MD5

    7b4023faf5763923d255004da819a742

  • SHA1

    91523ee535ef069839213fd031ec432141bcb48b

  • SHA256

    572fa6d58d106b440026e0341e060453ee5ac37e9473660f8164bb1f4d95c13c

  • SHA512

    6300de5da1ee01835828dc43bf5e6972187e7e34e4f4b489bd825d4753a17950133f2516b9106fb5ab14d88b741a3fb8c6fe34ca4399adc5f0d1971170f6bfa5

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4skkhZM6/HXSEtCSiAACf64e9PSidwE+AkQsTxH7IHqd:91OgLdaAh+6/HC0i/b9t+EVkHTxH7IKd

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\572fa6d58d106b440026e0341e060453ee5ac37e9473660f8164bb1f4d95c13c.exe
    "C:\Users\Admin\AppData\Local\Temp\572fa6d58d106b440026e0341e060453ee5ac37e9473660f8164bb1f4d95c13c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wxDfast\bhoclass.dll

    Filesize

    137KB

    MD5

    ac13c733379328f86568f6e514c2f7f8

    SHA1

    338901240fedcef4e3892fd4c723c89154f4de05

    SHA256

    7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

    SHA512

    35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    8e6138eb727d52f795ccd83e690b78a5

    SHA1

    8c122e2e744ebec9178b83c8f3462b6af6f92106

    SHA256

    3739270ca2933d2432b5e8c60b4b4c7f1df4f00477b378afbaaa7dace7fd7ae7

    SHA512

    d6cf321851753b66ad61008a86800c94513da391f7db5640731169258ffad13e2165de37ea45d5e9ecda6e9af751487e6a65a1cdcbae11d131bea8420b00e2d3

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    0d70f866a8c131f4676c59e1c3a8184b

    SHA1

    34aecab6bdc377a9633cf0c6d613d1a3c230f56c

    SHA256

    cb9703fd717bf327f5b069e8f9f0a9bffbb087cab419a393cfcf1ff274c3eb45

    SHA512

    140a5790779a68cf128fc00f87b9512b308cb1f891286f3f1e2be4e5e73bdc416b3e8bcd18725d54a739074839b96f7c7592a301fd3cf27ccddcd10ccb8c4efe

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    6025c032559fa41905e5c930513f6c84

    SHA1

    f4ba4d080e59e24b158a1529b5810b7aea57d136

    SHA256

    59e38e129dd3c504e53a35cc978ea0c6ee823b143d1570ceef02321b9bf1dce6

    SHA512

    409cbffd62eb5f4023691040cd6bca07261c294ee72c14f33d5c5c47e08ec1d47072c2c59b3886574b82f6589d1670aaead937e8f66d9444b31927b3dbef305b

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    ee51b09cb5cd4a7b05f4e06810f14bc4

    SHA1

    4ee51a472a5e2fda64d0f8d28f9653179e377b9e

    SHA256

    a583a65cb460ceeef808927d76be19af28845a6b7b1443563b60070728e2d77b

    SHA512

    1119e094397c631904e48cf8697d543818a6a4a8e3905f537226ec8b65065cbdcf4162159844910a75b6b1404aeedd7ab5657a4581680f4c1f6a187176981da6

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    9ff4b311cd7c31e5355521118aad7c70

    SHA1

    47c9c48117fa5cfb8865f2f834dd7278131c950b

    SHA256

    bfff1862739e64c2f0ebc0e3e42de8b2df6723345fd92cf69812fa094d2cba92

    SHA512

    d9b2aa62ea49694e501744b35a0fb79e4321778dcf25ec9492e602280a9352d08c5044b54fc421b8db6aa2d6bd332b357de790365fa711547565374874853490

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    c8470611b4c682ca67ac3e11e2b6e1c7

    SHA1

    4c803b45cd2261d9575124f191daa999e4bb955b

    SHA256

    e26a94e4e06d566f6f7efb72ee52fc6e598ea9ee6fd0e1bb65e2758e676402b9

    SHA512

    1df05a1d05b262612e743c44ba7506cd37c1b021e3caa2eba4d2251d04df95e457d89dc562bf568063be9f4fa1dd98cbf8c1433ad4ff9cde8712639d90674674

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    2d06b79fef51b980d9321ccb9101fbba

    SHA1

    eeeb327ca04f5e5a7116ad1252deca135e85919b

    SHA256

    085de8ade6ce1d65b0b9e934adb689173e259dca6627d2e76f296e811be81ee3

    SHA512

    6a758d5b8346d0449f399f348efaa10b2e33f11f1910dae177171821acd27e71bc8dd8e25cc356202560e99928a826a1d1eab99b11b502c7bfba37967f36ab47

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\[email protected]\install.rdf

    Filesize

    677B

    MD5

    6836430120dd112435a8996a547bb458

    SHA1

    2dda04cf857d92b285cc60b8fd9acdd860c4c78d

    SHA256

    8d687af36805e82a3163b52ea5bd584b7d8a0a5c2fce928106d816901d9cda6f

    SHA512

    d0211d330d2e98627f64d66f68c2a8d2559ea1c21c36a08adb4aed0b997555ed220b6428904890776f8b5a9f59d3b0210121bb32f927fcadbd26ae950f791d50

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\background.html

    Filesize

    5KB

    MD5

    896650831ddc1ab402c540c58f312c57

    SHA1

    4eed1748b045258f38f5d4fd903a03e24135ad39

    SHA256

    38c2b5d565d917ee69a3f07c16864f3e4157622d0d2749b42b48d39b71e32303

    SHA512

    3f7775f08a1a205f041969603a83ee942f9b6b650ed15c6c1cc936fdb2534446a7f8d837d56c06fe68bf2627ba50af0a65805ac0dc75f96dd3b76d1d8a6b6f85

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\bhoclass.dll

    Filesize

    137KB

    MD5

    ac13c733379328f86568f6e514c2f7f8

    SHA1

    338901240fedcef4e3892fd4c723c89154f4de05

    SHA256

    7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

    SHA512

    35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\content.js

    Filesize

    385B

    MD5

    123ca6bdcb8f3ecb9a6d58995e046bf0

    SHA1

    733db0561803797a85a3ce37b4fb6cf997f0ef59

    SHA256

    b94e5b603ebb03c8bd9293a4b5626a132e1ec63b06f24f1b1e4c4a67da9abdb7

    SHA512

    905f8b7069c9f5261d912f33124e57b4f1889afeb1b123a627c634daec0eca2016e884ab2791f81006af0f4e2743c259075d436e01cf4824d6c90efcb8005c42

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\ilinghamlnmididmkgdmoaehfhoddjna.crx

    Filesize

    37KB

    MD5

    187acb5c07969f4d0dc6075b8a317309

    SHA1

    1a2a3355deeb3f10cb0984b7dfeb9f329b1c60a8

    SHA256

    16427b5e3c68a323cc3fc2592771d67e0c555cd501533fac7bd1fa3c59e053bc

    SHA512

    2ea3b801b8ae54355ebcb58dee25533c8e53d648ed908ad5e4516d11e25188f946f46be53e13b183cbcfc382df187dd4bf6f14b86a4386a42693e3b5b1cbad4a

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\settings.ini

    Filesize

    599B

    MD5

    8af79029c1ea5643b6b94a3f0ebfe0c0

    SHA1

    88a7def9413a8c7948d57347fa0f9a1972b7b5b0

    SHA256

    aa0e912d151899b4bce879151ce323c59f863b88effcb0a04c9e62dc7a48ed61

    SHA512

    a88f8708a6c75e5b7cf0e6c83020d182bf15d0171ea9ac84d240cd86493dbdd3df679b1e7e75863b44451195c88280b66a74c66789149b46ec37fc2b5613ada6

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b

  • C:\Users\Admin\AppData\Local\Temp\7zSED62.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b

  • memory/4848-132-0x0000000000000000-mapping.dmp